Thursday 12 April 2018

What command would you run from a Windows command line to verify that a NIC can send and receive IPv4 packets?

1. (p. 176) What command would you run from a Windows command line to verify that a NIC can send and receive IPv4 packets?
A. arp-a
B. ipconfig/all
C. ping gateway
D. ping 127.0.0.1

2. (p. 147) At what layer of the OSI model does the Internet protocol work?
A. Session
B. Transport
C. Network
D. Data Link

3. (p. 151) Which of the following is a valid IP address for an individual system expressed in dotted decimal notation?
A. 0.0.0.0
B. b.255.255.255.255
C. 128-5EF-297
D. 215.233.32.91

4. (p. 151) How many binary digits are in an IPv4 address?
A. 4
B. 8
C. 16
D. 32

5. (p. 152) What is the range of decimal values in each of the four groups of an IPv4 address?
A. 1 to 256
B. 0 to 255
C. 1 to 1024
D. 0 to 1023

6. (p. 152) What is the binary equivalent of the decimal value 97?
A. 0110001
B. 1001110
C. 01000001
D. 01101010

7. (p. 150) What is the MAC broadcast address?
A. 0.0.0.0
B. 127.0.0.1
C. FF-FF-FF-FF-FF-FF
D. 1.1.1.1

8. (p. 159) Which of the following statements about subnet masks is NOT true?
A. A "0" in the subnet mask indicates part of the network ID.
B. All machines on the same network have the same subnet mask.
C. The subnet mask can be expressed either in dotted decimal or in the/x notation (example: 192.168.14.3/24)
D. The subnet mask is the same length as an IP address.

9. (p. 163) When viewed in binary, what value is always on the far left in the first octet of a Class A address?
A. 00
B. 10
C. 110
D. 0

10. (p. 162) If the first decimal value of an IP address is between 128 and 191, to what IP class does the network belong?
A. Class A
B. Class B
C. Class C
D. Class D

11. (p. 162) What is the maximum number of hosts you may have on a network if the first decimal value of the IP address is between 192 and 223 and the subnet mask is/24?
A. 16.7 million
B. 65,546
C. 254
D. 64

12. (p. 170) Which of the following subnet masks is an example of classless subnetting?
A. /8
B. /12
C. /16
D. /24

13. (p. 176) Which of the following is not a designated private IP address?
A. 192.168.64.7
B. 172.28.16.48
C. 153.6.2.1
D. 10.164.19.5

14. (p. 173) Which of the following automatically gives out IP information to computers that request it?
A. DNS
B. ping
C. DHCP
D. arp

15. (p. 163) What is the default subnet mask for a class C network?
A. 255.0.0.0
B. 255.255.255.0
C. 255.255.0.0
D. 255.255.255.255

16. (p. 158) How long is a subnet mask?
A. 24 bits
B. 32 bits
C. 32 bytes
D. 16 bits

17. (p. 145) What network protocol do Linux and Apple (Macintosh) systems most commonly use today?
A. AppleTalk
B. NetBIOS/NetBEUI
C. IPX/SPX
D. TCP/IP

18. (p. 152) The decimal value 151 converts to what binary value?
A. 10010111
B. 11010001
C. 10010110
D. 10010101

19. (p. 152) Convert the binary value 11010101 to decimal.
A. 221
B. 198
C. 245
D. 213

20. (p. 163) This is done by an ISP when it takes a block of addresses, subnets the block into multiple subnets, and then passes out the smaller individual subnets to customers.
A. dynamic addressing
B. CIDR
C. static addressing
D. BOOTP

21. (p. 173) What are the two names for dynamic IP addressing? (Choose two answers.)
A. Bootstrap Protocol (BOOTP)
B. ipconfig
C. Dynamic Host Configuration Protocol (DHCP)
D. IPv4
E. Both A and C

22. (p. 145) What is the de facto protocol suite of the Internet?
A. NetBEUI
B. IPX/SPX
C. TCP/IP
D. UNIX

23. (p. 163) This is done by an organization when it takes a block of addresses received from an ISP and breaks the single block of addresses into multiple subnetworks.
A. dynamic addressing
B. CIDR
C. static addressing
D. subnetting

24. (p. 163) If your network subnet mask is/16, what is the maximum number of host IDs available for this network?
A. 62
B. 65,534
C. 254
D. 16,277,214

25. (p. 146) At what layer of the OSI model does the Internet protocol (IP) work?
A. Presentation
B. Session
C. Network
D. Data Link

26. (p. 165) Which of the following is the formula you would use to arrive at the number of hosts on a subnet.
A. 2(number of ones in the subnet mask)-2
B. 2(number of zeroes in the subnet mask)-2
C. 2(number of zeroes in the subnet mask)
D. 2(number of ones in the subnet mask)-1

27. (p. 170) What is an IP addressing notation that uses a slash and is named for the method of generating blocks of IP addresses?
A. DHCP
B. BOOTP
C. CIDR
D. IANA

28. (p. 165) Which of the following is the correct formula for calculating the number of new subnets?
A. 2(number of zeroes in the subnet mask)-2
B. 2(number of ones in the subnet mask)-2
C. 2(number of ones in the network ID extension)-2
D. 2(number of network ID extension digits)-2

29. (p. 164) What command can you use to test the NIC's ability to send and receive packets?
A. arp-a
B. ping 255.255.255.255
C. ping 127.0.0.1
D. ipconfig

30. (p. 176) The addresses 127.0.0.1, 10.1.1.50, 172.16.200.1, and 192.168.35.44 are all examples of what?
A. DHCP lease addresses
B. APIPA addresses
C. special IP addresses
D. Class A addresses

31. (p. 148) Which protocol uses datagrams as its Protocol Data Unit?
A. UDP
B. IP
C. TCP
D. ICMP

32. (p. 147) Which of the following protocols are connection-oriented?
A. UDP
B. IP
C. ICMP
D. TCP

33. (p. 147) Which of the following protocols uses TCP as its transport layer protocol?
A. TFTP
B. SNMP
C. HTTP
D. ICMP

34. (p. 149) At which layer of the TCP/IP protocol stack do HTTP, FTP, and DNS reside?
A. Application layer
B. Internet layer
C. Transport layer
D. Link layer

35. (p. 149) Which of the following are NOT contained in a UDP header?
A. source port
B. destination port
C. checksum
D. acknowledgement number


No comments:

Post a Comment